Reverse Engineering and Exploit Writing course

Reverse Engineering and Exploit Writing course in India

reverse engineering and exploit writing

Reverse Engineering and Exploit Writing is a very important skill for cyber security professionals who have passion working in Anti-Virus companies. In this training we focus on imparting the knowledge on malware analysis and discovering vulnerabilities in in binaries so professional ethical hackers can be well prepared to mitigate the risk while they are working in organizations. Reverse Engineering and Exploit Writing course will elaborate about common software vulnerabilities and how to search them and how these vulnerabilities differ among different vulnerabilities in different operating systems.  This reverse engineering and exploit writing course is designed to give in-depth knowledge to the beginners who want to develop their career in cyber security, penetration testing and as a reverse engineer.

During reverse engineering and exploit writing training one would start with reversing demo version software into a full version software, including using fuzzing, stack overflows, and heap overflows. This reverse engineering and exploit writing training will teach you how you can reverse the compiled OS X and Android Applications. You will learn about simple exploits, web exploitation, and ARM exploitation.

After completing the reverse engineering and exploit writing training in Kolkata one would be able to find out vulnerabilities and write his own exploit and help the organization for whom you are working.

 

ENROLL NOW

Reverse Engineering and Exploit Writing Course Content

 

 

SMASHING THE STACK

⇒ Introduction to systems concepts

⇒ Using GDB and WinDBG

⇒ Stack overflows on Linux

⇒ Stack overflows on Windows XP

 

HEAP OVERFLOWS AND BROWSERS

 

⇒ Introduction to heap exploitation

⇒ Heap overflows on Linux

⇒ Heap overflows on Windows

⇒ Browser exploitation

 

BROWSERS, PDF AND MAC OS X

⇒ Browser exploitation continued

⇒ PDF exploits

⇒ Exploits on Mac OS X

⇒ Capture-The-Flag Round 1

 

ROP

⇒ Defeating DEP using Ret2LibC

⇒ Introduction to Return Oriented Programming

⇒ Practical ROP exploits

⇒ Bypassing ASLR

⇒ Capture-The-Flag Round 2

 

ADVANCED TOPICS

⇒ Complex exploits

⇒ Kernel exploitation

⇒ Integer overflows

⇒ JIT spraying

⇒ Advanced browser exploits

⇒ Advanced PDF exploits

 

THE EXPLOIT DEVELOPMENT PROCESS

⇒ Exploit methodology

⇒ Fault injection

⇒ Fuzzers

⇒ Tools of the trade

 

INTRODUCTION TO ASSEMBLY

⇒ Linux assembly Windows assembly

⇒ Writing and debugging assembly programs

 

WRITING SHELLCODE

⇒ Linux shellcode

⇒ Windows shellcode

 

STACK-BASED BUFFER OVERFLOWS

⇒ Memory architecture

⇒ Fault injection

⇒ Ollydbg

⇒ WinDebug

⇒ Gdb

⇒ Metasploit tools

⇒ Writing stack-based overflows for Linux

⇒ Writing stack-based overflows for Windows

 

SEH EXPLOITS

 

⇒ Structured Exception Handling

⇒ Seh Basics

⇒ SafeSEH Bypass

⇒ Writing SEH exploits

 

ADVANCED BUFFER OVERFLOWS

⇒ Bypassing DEP

⇒ Bypassing ASLR

⇒ Stack Cookies

⇒ Memcpy Buffer Overflow

⇒ Egg Hunter Shellcode

⇒  Strcpy Buffer Overflow

 

HEAP OVERFLOWS

⇒ Heap architecture

⇒ Writing heap overflows

 

ADVANCED METASPLOIT FRAMEWORK

⇒ Writing exploits for Metasploit

⇒ Advanced Meterpreter

 

FORMAT STRING ATTACKS

⇒ Writing format string attacks

 

 

Eligibility Criteria

 

Irrespective of any educational domain you can apply for this course if you have completed C | EH training from EC Council or have completed C| EHP Training from us.  Strong knowledge on basics of cyber security and having a keen interest to work in an Anti Virus Company can apply for this course.

 

Job Opportunities – Apply for Reverse Engineering Jobs

 

Cyber Device Engineer 

Software Security Engineer 

 

 

Course Duration:

50 Hours

 

Course Fee:

INR – 13,000/-

USD – 192.64/-

 

Get a Call from us

Your Name (required)

Your Email (required)

Phone Number (required)

Course Applied (required)

Your Message

Why Choose us for Reverse Engineering and Exploit Writing training?

 

  1. 100% Money refund guarantee if you are not satisfied.
  2. 90% Practical oriented classes
  3. Life time access to all the class videos apart from your LIVE classes
  4. Check out our GOOGLE REVIEWS

 

 

Most Popular Training Courses at Indian Cyber Security Solutions

Summer Training for CSE, IT, BCA & MCA Students 

Network Penetration Tester Training

Ethical Hacking  training

Python Programming training

CEH V9  training

Diploma in Network Security Training

Secured Coding in Java

Diploma in Web Application Security 

Certified Web Application Penetration Tester 

Certified Android Penetration Tester 

Certified Python Programming 

Advance Python Training 

 CCNA Training  

Amazon Web Services Training  

VMware Training 

 


Show Buttons
Hide Buttons